US5853197A - Security document - Google Patents

Security document Download PDF

Info

Publication number
US5853197A
US5853197A US08/611,378 US61137896A US5853197A US 5853197 A US5853197 A US 5853197A US 61137896 A US61137896 A US 61137896A US 5853197 A US5853197 A US 5853197A
Authority
US
United States
Prior art keywords
security
elements
areas
background
term
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/611,378
Inventor
William H Mowry, Jr.
A Dale Lakes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sr Acquisition Corp
Taylor Communications Inc
Original Assignee
Standard Register Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Standard Register Co filed Critical Standard Register Co
Priority to US08/611,378 priority Critical patent/US5853197A/en
Assigned to STANDARD REGISTER COMPANY, THE reassignment STANDARD REGISTER COMPANY, THE ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LAKES, A. DALE, MOWRY, WILLIAM H., JR.
Priority to JP9531769A priority patent/JP2000506085A/en
Priority to PCT/US1997/002229 priority patent/WO1997032735A1/en
Priority to NZ331420A priority patent/NZ331420A/en
Priority to CA002247112A priority patent/CA2247112C/en
Priority to EP97907612A priority patent/EP0889788B1/en
Priority to DE69708071T priority patent/DE69708071T2/en
Priority to AU19575/97A priority patent/AU717797B2/en
Priority to CO97011615A priority patent/CO4650202A1/en
Priority to IDP970685A priority patent/ID19781A/en
Priority to NO984055A priority patent/NO984055L/en
Publication of US5853197A publication Critical patent/US5853197A/en
Application granted granted Critical
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. NOTICE OF GRANT OF SECURITY INTEREST IN PATENTS Assignors: THE STANDARD REGISTER COMPANY
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT SECURITY AGREEMENT Assignors: THE STANDARD REGISTER COMPANY
Assigned to SILVER POINT FINANCE, LLC, AS ADMINISTRATIVE AGENT reassignment SILVER POINT FINANCE, LLC, AS ADMINISTRATIVE AGENT FIRST LIEN PATENT SECURITY AGREEMENT Assignors: THE STANDARD REGISTER COMPANY
Assigned to SILVER POINT FINANCE, LLC, AS ADMINISTRATIVE AGENT reassignment SILVER POINT FINANCE, LLC, AS ADMINISTRATIVE AGENT SECOND LIEN PATENT SECURITY AGREEMENT Assignors: THE STANDARD REGISTER COMPANY
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: THE STANDARD REGISTER COMPANY
Assigned to SILVER POINT FINANCE, LLC reassignment SILVER POINT FINANCE, LLC TERM LOAN PATENT SECURITY AGREEMENT Assignors: THE STANDARD REGISTER COMPANY
Assigned to THE STANDARD REGISTER COMPANY reassignment THE STANDARD REGISTER COMPANY RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A.
Assigned to THE STANDARD REGISTER COMPANY reassignment THE STANDARD REGISTER COMPANY RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT
Assigned to THE STANDARD REGISTER COMPANY reassignment THE STANDARD REGISTER COMPANY RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT
Assigned to THE STANDARD REGISTER COMPANY reassignment THE STANDARD REGISTER COMPANY SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT
Assigned to THE STANDARD REGISTER COMPANY reassignment THE STANDARD REGISTER COMPANY RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT
Assigned to SR ACQUISITION CORPORATION reassignment SR ACQUISITION CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: IMEDCONSENT, LLC, STANDARD REGISTER HOLDING COMPANY, STANDARD REGISTER INTERNATIONAL, INC., STANDARD REGISTER MEXICO HOLDING COMPANY, STANDARD REGISTER OF PUERTO RICO INC., STANDARD REGISTER TECHNOLOGIES, INC., THE STANDARD REGISTER COMPANY
Assigned to STANDARD REGISTER, INC. reassignment STANDARD REGISTER, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SR ACQUISITION CORPORATION
Anticipated expiration legal-status Critical
Assigned to TAYLOR COMMUNICATIONS, INC. reassignment TAYLOR COMMUNICATIONS, INC. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: STANDARD REGISTER, INC.
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/00883Auto-copy-preventive originals, i.e. originals that are designed not to allow faithful reproduction
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M3/00Printing processes to produce particular kinds of printed work, e.g. patterns
    • B41M3/14Security printing
    • B41M3/146Security printing using a non human-readable pattern which becomes visible on reproduction, e.g. a void mark
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S283/00Printed matter
    • Y10S283/902Anti-photocopy

Definitions

  • the invention is directed towards an improved security document and, more particularly, to a security document having a plurality of areas in which hidden warning messages are printed in differing combinations of lines, dots, and elements of various sizes and shapes.
  • Color photocopiers have been used for years to make accurate copies of commonly available documents. In many cases, there are legitimate reasons for making such copies. Unfortunately, color copies may also be made and used for illegal purposes. Specifically, there has been concern that color copiers could be used to reproduce security documents, such as checks, stock certificates, automobile title instruments, birth certificates, college transcripts, prescriptions, and other documents of value, for illegal purposes. This concern has been heightened with the advent of desk top publishing software and hardware, including personal computers and scanners. Such desk top publishing systems allow sophisticated image processing and printing not previously generally available.
  • Tone refers to the visual effect produced by solid ink coverage or by halftone dots, bars, or marks which cover a portion of a printed area and which usually have a frequency that is measured in dots, lines, or marks per inch.
  • Halftone dots, bars, or marks printed with a dark ink may be more or less uniformly distributed over an area to produce the visual effect of a lighter overall color. Printing an image with less than full area coverage is said to be printing less than a full tone image.
  • the warning phrase and background pattern area tones are of different frequency and are made up of dots, bars, or marks of differing size, but they are selected to provide similar appearance to the eye of a casual observer.
  • a less than full tone effect may also be produced by full area coverage of a paler color of ink than the darker color of ink used for the halftone dots, bars, or marks.
  • the tone of the warning phrase and the tone of the background pattern are selected to be generally the same, these two areas have much the same visual impact on an observer of the original document, and the warning phrase is not readily perceived.
  • the optics of color copiers have typically been unable to reproduce relatively small halftone dots, lines or other elements. As a consequence, reproduced copies of the original document will have a noticeable warning phrase.
  • a camouflage pattern is sometimes utilized to obscure the warning phrase further.
  • the camouflage pattern may be defined by areas in which the dots, bars, or marks have been deleted from both the warning phrase and the background pattern.
  • the camouflage pattern may also be defined by a pattern of dots, bars, or marks which are smaller than or larger than those used in the background pattern and the warning phrase, or by areas of complete coverage of a paler ink.
  • the camouflage pattern may permit the tone of the warning phrase and the tone of the background pattern to differ somewhat, while confusing the eye of the casual observer so that the warning phrase is not readily apparent.
  • the 4,227,720 patent uses small dots as background elements while larger dots are used to form a warning word.
  • Other patents have used different elements to achieve a similar effect.
  • U.S. Pat. No. 4,891,666 uses small dots as background elements and line segments to form a warning word.
  • U.S. Pat. No. 5,375,886, on the other hand uses curved lines as background elements and small dots to form the warning word.
  • Another technique is shown in UK Patent Application GB 2,018,197 A. In this published application, line segments are used both as background elements and as warning word elements. The lines are perpendicular to each other in the areas defining the background pattern and the warning phrase.
  • the present invention divides the surface of a security document into numerous areas, referred to as copy modules, in which different security image techniques are used. This results in an improved security document because different techniques will be more effective under different conditions. Therefore, when one copy module security image is rendered ineffective due to the copier settings or the orientation of the document on the copier, other copy modules will still produce a security image upon copying.
  • a security document comprises a substrate having a top surface for carrying indicia.
  • the top surface has a plurality of areas.
  • Each of the areas contains background printed matter that is made up of a pattern of background elements.
  • Each of the areas also contains a security term printed on the top surface of the substrate.
  • the security term is composed of a pattern of security term elements.
  • the background elements or the security term elements, or both differ in element size, shape, angle, density, and/or frequency between adjacent areas. Also, within each of the areas either the background elements or the security term elements are not resolvable by a color copier while the remaining elements in the area are resolvable by a color copier. This results in a visually perceptible security term being produced on a photocopy of the security document.
  • the background printed matter in an area is made up of a pattern of background elements of substantially the same size.
  • the security term is preferably made up of a pattern of security term elements of substantially the same size. In some areas, the background elements are not resolvable by the color copier while in other areas, the security term elements are not resolvable by a color copier.
  • each security term element is preferably a printed dot or a line segment.
  • each background element is preferably a printed dot or a line segment.
  • each security term element and each background element is a printed dot. In an alternative preferred embodiment, each security term element and each background element is a line segment.
  • elements shaped as line segments are oriented at angles of approximately 0, 15, 30, 45, 60, 75, 90, 105, 120, 135, 150, or 165 degrees to the horizontal axis of the security document.
  • the background elements are spaced at twice the frequency of the security term elements.
  • the security document also contains a camouflage pattern on the top surface.
  • the camouflage pattern may be defined by the absence of the background elements and/or the security term elements.
  • the background elements and/or the security term elements are either completely or partially removed.
  • the camouflage pattern is defined by the presence of further elements.
  • the top surface of the security document contains at least three areas. More preferably, the top surface contains at least four areas. Still more preferably, the top surface contains at least ten areas. More preferably, the top surface contains at least twenty areas. Most preferably, the top surface contains at least forty areas.
  • the security document comprises a substrate having a top surface for carrying indicia and a plurality of areas on the top surface.
  • Each of the areas contains background printed matter on the top surface.
  • the background printed matter is made up of a pattern of background elements and the background elements are not resolvable by a color copier.
  • Each of the areas also contains a security term printed on the top surface of the substrate.
  • the security term is composed of a pattern of security term elements.
  • the security term elements are resolvable by a color copier to show a visually perceptible security term.
  • the background elements or the security term elements, or both differ in element size, shape, angle, density, and/or frequency between adjacent areas.
  • the security document comprises a substrate having a top surface for carrying indicia and a plurality of areas on the top surface.
  • Each of the areas contains background printed matter on the top surface.
  • the background printed matter is made up of a pattern of background elements and the background elements are resolvable by a color copier to show a visually perceptible security term.
  • Each of the areas also contains a security term printed on the top surface of the substrate.
  • the security term is composed of a pattern of security term elements.
  • the security term elements are not resolvable by a color copier.
  • the background elements or the security term elements, or both differ in element size, shape, angle, density, and/or frequency between adjacent areas.
  • FIG. 1 is a schematic representation of a check according to the present invention.
  • FIG. 2 is a schematic representation of a security document containing copy modules according to the present invention.
  • the present invention is an improvement over past security documents in that it provides a variety of security images on one document and these security images are produced using a variety of techniques. This results in an improved security document because different techniques will be more effective in different conditions. Therefore, when one copy module security image is rendered ineffective due to the copier settings or the orientation of the document on the copier, other copy modules will still produce a security image upon copying. Also, the present invention is useful in providing a security element on documents having limited available unprinted surface area, such as currency, tickets, and other small items.
  • FIGS. 1 and 2 illustrate a check 10 and security document 40 according to the present invention. It will be appreciated that the documents shown in FIGS. 1 and 2 are depicted diagrammatically and are not made to scale.
  • FIG. 1 a check 10 having a horizontal axis 12 and a vertical axis 14 is shown.
  • a copy module 20 is indicated in the corner.
  • the copy module 20 contains background printed matter 22, made up of background elements 24.
  • the copy module 20 also contains a security term 26, the word "VOID," composed of security term elements 28.
  • the background elements 24 are line segments oriented at a 0 degree angle to the horizontal axis 12 of the check 10.
  • the security term elements 28 of copy module 20 are also line segments. However, these line segments are oriented at a 135 degree angle to the horizontal axis 12 of the check 10.
  • FIG. 2 a security document 40 having a horizontal axis 42 and a vertical axis 44 is shown.
  • a copy module 50 is indicated.
  • the copy module 50 contains background printed matter 52, made up of background elements 54.
  • the copy module 50 also contains a security term 56, the word "VOID,” composed of security term elements 58.
  • the background elements 54 are line segments oriented at a 90 degree angle to the horizontal axis 42 of the security document 40.
  • the security term elements 58 of copy module 50 are small dots.
  • Copy module 60 is adjacent to copy module 50.
  • the background elements 64 in copy module 60 differ from the background elements 54 in copy module 50.
  • the background elements 64 are small dots, while the background elements 54 are line segments.
  • the security term elements 68 in copy module 60 differ from the security term elements 58 in copy module 50.
  • the security term elements 68 are large dots, while the security term elements 58 are small dots.
  • the background elements and/or the security term elements vary between adjacent copy modules.
  • This variation may include changing between lines and dots, changing the size of the dots used, changing the orientation (angle) of the lines, changing the frequency of the rows of lines or dots, and changing the density of the background printed matter and the security term by altering the amount of surface area of the copy module that is covered with ink.
  • the size of the warning message can be changed between adjacent copy modules, as can the position of the warning message within each copy module.
  • the tone of the elements may also be changed from one copy module to another.
  • each copy module area 20, e.g., a selected area 20a is bounded by directly adjacent areas, e.g., directly adjacent areas 20b, 20c, 20d, 20e, containing a pattern of background elements 24 and a pattern of security elements 28.
  • the background elements 24 and the security elements 28 within a selected area 20a differ in element size, shape, angle, density, or frequency from corresponding background elements 24 and security elements 28 in a directly adjacent area 20b offset from the selected area 20a in a first direction 4.
  • the background elements 24 and the security elements 28 within the selected area 20a differ in element size, shape, angle, density, or frequency from corresponding background elements 24 and security elements 28 in a directly adjacent area 20c offset from the selected area 20a in a second direction 6, which may be orthogonal to the first direction 4.
  • a linear projection 8 co-linear with the first direction 4 does not intersect both of the first directly adjacent area 20b and the second directly adjacent area 20c.
  • the background elements 24 within the selected area 20a differ in element shape from corresponding background elements 24 and security elements 28 in the directly adjacent area 20b.
  • the security elements 28 within the selected area 20a differ in element shape from corresponding background elements 24 and security elements 28 in the directly adjacent area 20b.
  • the background elements 24 within the selected area 20a differ in element angle from corresponding background elements 24 in the directly adjacent area 20c and differ In element shape from the security elements 28 in the directly adjacent area 20c.
  • the security elements 24 within the selected area 20a differ in element density and frequency from the background elements 24 in the directly adjacent area 20c and differ in element shape from the corresponding security elements 28 in the directly adjacent area 20c.
  • the background and security elements include dots (both large dots and small dots), line segments, triangles, rectangles, curves, swirls, and other geometric shapes.
  • a "printed dot” is defined as an element that is generally circular in shape. However, a “printed dot” may have rough edges or be elliptical in shape due to the conditions of printing. Examples of various relationships between the background elements and the security elements include:
  • the rows of small dots and large dots may be oriented in the same direction.
  • the line segments may be oriented in the same direction as the rows of large or small dots. Alternatively, the line segments may be oriented at a different angle than the rows of dots. A preferred angle is 90 degrees.
  • the line segments of one set of elements will be at a different angle than the line segments of the other set of elements. A preferred angle is 90 degrees.
  • the frequencies of the background elements and the security term elements may be the same or they may be different. If the frequencies are different, it is preferred, but not required, that one set of elements be spaced at twice the frequency of the other set of elements. For instance, one useful combination is 130 lines per inch for the security term elements and 65 lines per inch for the background elements. Another useful combination is 120 lines per inch for the security term elements and 60 lines per inch for the background elements.
  • the density of the background printed matter and the security term on the surface of the document may vary from 3 percent coverage to 50 percent coverage. Preferably, densities of 10 to 15 percent are used.
  • the density of the background printed matter and the density of the security term within a copy module may be the same, or the densities may differ. Also, densities and density differentials may differ from one copy module to the next. These density differences result in copy modules which may produce positive or negative images at different copier settings.
  • Density differentials between the background printed matter and the security term can make the security term more noticeable on a photocopy without excessive visibility on the original.
  • a difference in the density is small to reduce the likelihood that the security term will be noticed.
  • one useful combination would be a density of 15% for the security term and 10% for the background printed matter. The small density difference will tend to make the security term more obvious on a photocopy.
  • a camouflage image may be used to make security terms less apparent on the original security document.
  • Elements shaped as line segments will have an angular orientation with respect to the security document.
  • line segments are oriented at 0, 15, 30, 45, 60, 75, 90, 105, 120, 135, 150, or 165 degrees to the horizontal axis of the security document, but any angular orientation may be used.
  • Each copy module contains a security term.
  • the security term may take the form of a single warning word, such as "VOID.”
  • the security term may be in the form of multiple warning words in each copy module.
  • the security term may form part of a large warning word covering multiple copy modules.
  • the tone of the security document may be a uniform tone over the document surface.
  • the density of the document may have different values for the security term and the background printed matter, but the field will appear constant.
  • the surface of the security document may use a graded or graduated screen.
  • the frequencies of the background elements and the security term elements remain the same, while the size of the elements is varied across the document.
  • the frequency might be 130 lines per inch and 65 lines per inch for the background elements and the security term elements, respectively.
  • the size of the background elements may vary across the document so that the density varies from 30% of the area covered to 3%, and the size of the security term elements may vary across the document so that the density varies from 49% to 4% of the area covered.
  • the highest percentages of coverage may be at the top of the security document. These percentages are then gradually reduced toward the bottom of the document. This change in coverage percentages may occur in steps, producing bands of slightly differing tone.
  • the size of the elements or the frequency of the elements, or both may be continuously varied over the document surface. Regardless of the manner in which the size of the background elements and the size of the security term elements are varied, the selection of element sizes for a given area on the document is made such that they provide generally equal tone. The tones may differ more if a camouflage image is used.
  • the copy module areas can be any shape.
  • more than one shape of copy module can be used in a security document.
  • a shape such as a rectangle, a square, a circle, or a triangle is used.
  • copy modules are rectangular in shape.
  • the security document of the present invention contains at least two copy modules. Preferably, at least ten copy modules are present on a security document. More preferably, at least twenty copy modules are used. Most preferably, at least forty copy modules are used on the security document.
  • phrase “security term” is intended to include not only words, such as the word “VOID” shown in the drawings, but also words and phrases which simply make evident to an observer that the document being inspected is a copy of the original document. Such phrases as “PHOTOCOPY”, “COPY”, and “DUPLICATE” may be used for this purpose. Also intended to be included within the phrase “security term” are words or symbols which may signify to the individual making the copy that the original document is authentic.
  • cancer term is intended to include words, such as the word “VOID” shown in the drawings, and phrases, such as "UNAUTHORIZED COPY,” which make evident to an observer that the document being inspected is a copy of the original document and that the copy is not authentic.
  • camouflage images may be utilized in this fashion to disguise the cancellation terms on a security document according to the present invention.
  • the camouflage image usually occupies about 50% of the document surface area.
  • a properly configured camouflage image becomes the dominant image in the eye of the casual observer.
  • a camouflage image may be defined by the absence of elements within the image area or by the presence of further printed elements.
  • Elements which are removed to define a camouflage image may be wholly or partially removed. Partial removal of an element results in a portion of the element being completely removed.
  • adjacent refers to areas that are adjoining.
  • adjacent copy modules are copy modules that share a portion of their respective boundaries with each other.
  • ordered array describes an organized layout of areas of approximately equal size.
  • readily duplicated is defined as being capable of being clearly reproduced without significant blurring of the image.
  • a preferred method for producing a document according to the present invention is as follows:

Landscapes

  • Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Credit Cards Or The Like (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Cleaning In Electrography (AREA)

Abstract

A security document is provided comprising a substrate having a top surface for carrying indicia. The top surface has a plurality of areas. Each of the areas contains background printed matter on the top surface. The background printed matter made up of a pattern of background elements. Each of the areas also contains a security term printed on the top surface of the substrate. The security term is composed of a pattern of security term elements. The background elements and/or the security term elements differ in element size, shape, angle, density, and/or frequency between adjacent areas. Also, within each of the areas either the background elements or the security term elements are not readily duplicated by a color copier while the remaining elements in the area are readily duplicated by a color copier. This results in a visually perceptible security term being produced upon copying of the security document.

Description

BACKGROUND OF THE INVENTION
The invention is directed towards an improved security document and, more particularly, to a security document having a plurality of areas in which hidden warning messages are printed in differing combinations of lines, dots, and elements of various sizes and shapes.
Color photocopiers have been used for years to make accurate copies of commonly available documents. In many cases, there are legitimate reasons for making such copies. Unfortunately, color copies may also be made and used for illegal purposes. Specifically, there has been concern that color copiers could be used to reproduce security documents, such as checks, stock certificates, automobile title instruments, birth certificates, college transcripts, prescriptions, and other documents of value, for illegal purposes. This concern has been heightened with the advent of desk top publishing software and hardware, including personal computers and scanners. Such desk top publishing systems allow sophisticated image processing and printing not previously generally available.
Many techniques have been developed to prevent improper reproduction of security documents. One of the most successful is the use of a hidden warning message which is readily apparent on reproduced copies of a document, but which is invisible, or nearly so, on the original document.
Many techniques have been used to produce this effect. One technique is shown in U.S. Pat. No. 4,227,720. A single tone warning phrase and a single tone background pattern are used. Tone refers to the visual effect produced by solid ink coverage or by halftone dots, bars, or marks which cover a portion of a printed area and which usually have a frequency that is measured in dots, lines, or marks per inch. Halftone dots, bars, or marks printed with a dark ink may be more or less uniformly distributed over an area to produce the visual effect of a lighter overall color. Printing an image with less than full area coverage is said to be printing less than a full tone image. The warning phrase and background pattern area tones are of different frequency and are made up of dots, bars, or marks of differing size, but they are selected to provide similar appearance to the eye of a casual observer. A less than full tone effect may also be produced by full area coverage of a paler color of ink than the darker color of ink used for the halftone dots, bars, or marks.
Because the tone of the warning phrase and the tone of the background pattern are selected to be generally the same, these two areas have much the same visual impact on an observer of the original document, and the warning phrase is not readily perceived. The optics of color copiers have typically been unable to reproduce relatively small halftone dots, lines or other elements. As a consequence, reproduced copies of the original document will have a noticeable warning phrase.
A camouflage pattern is sometimes utilized to obscure the warning phrase further. The camouflage pattern may be defined by areas in which the dots, bars, or marks have been deleted from both the warning phrase and the background pattern. The camouflage pattern may also be defined by a pattern of dots, bars, or marks which are smaller than or larger than those used in the background pattern and the warning phrase, or by areas of complete coverage of a paler ink. The camouflage pattern may permit the tone of the warning phrase and the tone of the background pattern to differ somewhat, while confusing the eye of the casual observer so that the warning phrase is not readily apparent.
The 4,227,720 patent uses small dots as background elements while larger dots are used to form a warning word. Other patents have used different elements to achieve a similar effect. U.S. Pat. No. 4,891,666 uses small dots as background elements and line segments to form a warning word. U.S. Pat. No. 5,375,886, on the other hand, uses curved lines as background elements and small dots to form the warning word. Another technique is shown in UK Patent Application GB 2,018,197 A. In this published application, line segments are used both as background elements and as warning word elements. The lines are perpendicular to each other in the areas defining the background pattern and the warning phrase.
In recent years, color copiers have been improved substantially. These new color copiers have made the above techniques less effective in protecting documents. By manipulating the control settings on such copiers, copies can be made of such documents in which the warning phrase does not appear on reproductions when some of the most commonly used frequency and size combinations are used. For example, by adjusting the settings for sharpness and lightness/darkness it has still been possible on some copiers for a skilled individual to produce a copy in which the warning phrase is not visible. Furthermore, desk top publishing systems now available in conjunction with laser printers, offer additional possibilities for unauthorized copying.
Therefore, there remains a need in the art for a security document which provides improved protection against copying over a wide range of copier settings, or against manipulation using desk top publishing systems.
SUMMARY OF THE INVENTION
This need is met by the present invention whereby an improved security document is provided. The present invention divides the surface of a security document into numerous areas, referred to as copy modules, in which different security image techniques are used. This results in an improved security document because different techniques will be more effective under different conditions. Therefore, when one copy module security image is rendered ineffective due to the copier settings or the orientation of the document on the copier, other copy modules will still produce a security image upon copying.
In accordance with one aspect of the present invention, a security document is provided. The security document comprises a substrate having a top surface for carrying indicia. The top surface has a plurality of areas. Each of the areas contains background printed matter that is made up of a pattern of background elements. Each of the areas also contains a security term printed on the top surface of the substrate. The security term is composed of a pattern of security term elements. The background elements or the security term elements, or both, differ in element size, shape, angle, density, and/or frequency between adjacent areas. Also, within each of the areas either the background elements or the security term elements are not resolvable by a color copier while the remaining elements in the area are resolvable by a color copier. This results in a visually perceptible security term being produced on a photocopy of the security document.
Preferably, the background printed matter in an area is made up of a pattern of background elements of substantially the same size. Also, the security term is preferably made up of a pattern of security term elements of substantially the same size. In some areas, the background elements are not resolvable by the color copier while in other areas, the security term elements are not resolvable by a color copier.
Preferably, the security term is a cancellation term. Also, each security term element is preferably a printed dot or a line segment. Additionally, each background element is preferably a printed dot or a line segment.
In a preferred embodiment, each security term element and each background element is a printed dot. In an alternative preferred embodiment, each security term element and each background element is a line segment.
Preferably, elements shaped as line segments are oriented at angles of approximately 0, 15, 30, 45, 60, 75, 90, 105, 120, 135, 150, or 165 degrees to the horizontal axis of the security document. Also preferably, the background elements are spaced at twice the frequency of the security term elements.
In a preferred embodiment, the security document also contains a camouflage pattern on the top surface. The camouflage pattern may be defined by the absence of the background elements and/or the security term elements. The background elements and/or the security term elements are either completely or partially removed. Alternatively, the camouflage pattern is defined by the presence of further elements.
Preferably, the top surface of the security document contains at least three areas. More preferably, the top surface contains at least four areas. Still more preferably, the top surface contains at least ten areas. More preferably, the top surface contains at least twenty areas. Most preferably, the top surface contains at least forty areas.
In accordance with a second aspect of the present invention an improved security document is provided. The security document comprises a substrate having a top surface for carrying indicia and a plurality of areas on the top surface. Each of the areas contains background printed matter on the top surface. The background printed matter is made up of a pattern of background elements and the background elements are not resolvable by a color copier. Each of the areas also contains a security term printed on the top surface of the substrate. The security term is composed of a pattern of security term elements. The security term elements are resolvable by a color copier to show a visually perceptible security term. In addition, the background elements or the security term elements, or both, differ in element size, shape, angle, density, and/or frequency between adjacent areas.
In accordance with a third aspect of the present invention an improved security document is provided. The security document comprises a substrate having a top surface for carrying indicia and a plurality of areas on the top surface. Each of the areas contains background printed matter on the top surface. The background printed matter is made up of a pattern of background elements and the background elements are resolvable by a color copier to show a visually perceptible security term. Each of the areas also contains a security term printed on the top surface of the substrate. The security term is composed of a pattern of security term elements. The security term elements are not resolvable by a color copier. In addition, the background elements or the security term elements, or both, differ in element size, shape, angle, density, and/or frequency between adjacent areas.
Accordingly, it is an object of the present invention to provide an improved security document in which a variety of areas containing hidden security terms are present on the surface of the document; and to provide such a document with various combinations of background elements and security term elements in the different areas. Other objects and advantages of the invention will be apparent from the following description, the accompanying drawings and the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic representation of a check according to the present invention.
FIG. 2 is a schematic representation of a security document containing copy modules according to the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention is an improvement over past security documents in that it provides a variety of security images on one document and these security images are produced using a variety of techniques. This results in an improved security document because different techniques will be more effective in different conditions. Therefore, when one copy module security image is rendered ineffective due to the copier settings or the orientation of the document on the copier, other copy modules will still produce a security image upon copying. Also, the present invention is useful in providing a security element on documents having limited available unprinted surface area, such as currency, tickets, and other small items.
Reference is made to FIGS. 1 and 2 which illustrate a check 10 and security document 40 according to the present invention. It will be appreciated that the documents shown in FIGS. 1 and 2 are depicted diagrammatically and are not made to scale.
In FIG. 1, a check 10 having a horizontal axis 12 and a vertical axis 14 is shown. A copy module 20 is indicated in the corner. The copy module 20 contains background printed matter 22, made up of background elements 24. The copy module 20 also contains a security term 26, the word "VOID," composed of security term elements 28. In copy module 20, the background elements 24 are line segments oriented at a 0 degree angle to the horizontal axis 12 of the check 10. The security term elements 28 of copy module 20 are also line segments. However, these line segments are oriented at a 135 degree angle to the horizontal axis 12 of the check 10.
In FIG. 2, a security document 40 having a horizontal axis 42 and a vertical axis 44 is shown. A copy module 50 is indicated. The copy module 50 contains background printed matter 52, made up of background elements 54. The copy module 50 also contains a security term 56, the word "VOID," composed of security term elements 58. In copy module 50, the background elements 54 are line segments oriented at a 90 degree angle to the horizontal axis 42 of the security document 40. The security term elements 58 of copy module 50 are small dots.
Copy module 60 is adjacent to copy module 50. The background elements 64 in copy module 60 differ from the background elements 54 in copy module 50. The background elements 64 are small dots, while the background elements 54 are line segments. Also, the security term elements 68 in copy module 60 differ from the security term elements 58 in copy module 50. The security term elements 68 are large dots, while the security term elements 58 are small dots.
As shown in FIGS. 1 and 2, the background elements and/or the security term elements vary between adjacent copy modules. This variation may include changing between lines and dots, changing the size of the dots used, changing the orientation (angle) of the lines, changing the frequency of the rows of lines or dots, and changing the density of the background printed matter and the security term by altering the amount of surface area of the copy module that is covered with ink. Also, the size of the warning message can be changed between adjacent copy modules, as can the position of the warning message within each copy module. In addition, the tone of the elements may also be changed from one copy module to another.
Specifically, referring to FIG. 1, each copy module area 20, e.g., a selected area 20a, is bounded by directly adjacent areas, e.g., directly adjacent areas 20b, 20c, 20d, 20e, containing a pattern of background elements 24 and a pattern of security elements 28. The background elements 24 and the security elements 28 within a selected area 20a differ in element size, shape, angle, density, or frequency from corresponding background elements 24 and security elements 28 in a directly adjacent area 20b offset from the selected area 20a in a first direction 4. Further, the background elements 24 and the security elements 28 within the selected area 20a differ in element size, shape, angle, density, or frequency from corresponding background elements 24 and security elements 28 in a directly adjacent area 20c offset from the selected area 20a in a second direction 6, which may be orthogonal to the first direction 4. A linear projection 8 co-linear with the first direction 4 does not intersect both of the first directly adjacent area 20b and the second directly adjacent area 20c.
More specifically, referring to FIG. 1, the background elements 24 within the selected area 20a differ in element shape from corresponding background elements 24 and security elements 28 in the directly adjacent area 20b. The security elements 28 within the selected area 20a differ in element shape from corresponding background elements 24 and security elements 28 in the directly adjacent area 20b. The background elements 24 within the selected area 20a differ in element angle from corresponding background elements 24 in the directly adjacent area 20c and differ In element shape from the security elements 28 in the directly adjacent area 20c. The security elements 24 within the selected area 20a differ in element density and frequency from the background elements 24 in the directly adjacent area 20c and differ in element shape from the corresponding security elements 28 in the directly adjacent area 20c.
Specific various shapes of the background and security elements include dots (both large dots and small dots), line segments, triangles, rectangles, curves, swirls, and other geometric shapes. A "printed dot" is defined as an element that is generally circular in shape. However, a "printed dot" may have rough edges or be elliptical in shape due to the conditions of printing. Examples of various relationships between the background elements and the security elements include:
______________________________________                                    
Background elements                                                       
                   Security Term Elements                                 
______________________________________                                    
Large dot          Small dot                                              
Small dot          Large dot                                              
Line segment       Small dot                                              
Line segment       Large dot                                              
Small dot          Line segment                                           
Large dot          Line segment                                           
Line segment       Line segment                                           
______________________________________                                    
The rows of small dots and large dots may be oriented in the same direction. The line segments may be oriented in the same direction as the rows of large or small dots. Alternatively, the line segments may be oriented at a different angle than the rows of dots. A preferred angle is 90 degrees. When both the background elements and the security term elements are composed of line segments, the line segments of one set of elements will be at a different angle than the line segments of the other set of elements. A preferred angle is 90 degrees.
The frequencies of the background elements and the security term elements may be the same or they may be different. If the frequencies are different, it is preferred, but not required, that one set of elements be spaced at twice the frequency of the other set of elements. For instance, one useful combination is 130 lines per inch for the security term elements and 65 lines per inch for the background elements. Another useful combination is 120 lines per inch for the security term elements and 60 lines per inch for the background elements.
The density of the background printed matter and the security term on the surface of the document may vary from 3 percent coverage to 50 percent coverage. Preferably, densities of 10 to 15 percent are used. The density of the background printed matter and the density of the security term within a copy module may be the same, or the densities may differ. Also, densities and density differentials may differ from one copy module to the next. These density differences result in copy modules which may produce positive or negative images at different copier settings.
Density differentials between the background printed matter and the security term can make the security term more noticeable on a photocopy without excessive visibility on the original. Preferably, a difference in the density is small to reduce the likelihood that the security term will be noticed. For example, one useful combination would be a density of 15% for the security term and 10% for the background printed matter. The small density difference will tend to make the security term more obvious on a photocopy. If desired, a camouflage image may be used to make security terms less apparent on the original security document.
Elements shaped as line segments will have an angular orientation with respect to the security document. Preferably, line segments are oriented at 0, 15, 30, 45, 60, 75, 90, 105, 120, 135, 150, or 165 degrees to the horizontal axis of the security document, but any angular orientation may be used.
Each copy module contains a security term. The security term may take the form of a single warning word, such as "VOID." Alternatively, the security term may be in the form of multiple warning words in each copy module. In another alternative, the security term may form part of a large warning word covering multiple copy modules. These various alternatives allow for placement of warning messages of a broad range of sizes anywhere on the surface of the security document.
The tone of the security document may be a uniform tone over the document surface. In this embodiment, the density of the document may have different values for the security term and the background printed matter, but the field will appear constant. Alternatively, the surface of the security document may use a graded or graduated screen. In this embodiment, for example, the frequencies of the background elements and the security term elements remain the same, while the size of the elements is varied across the document. As an example, the frequency might be 130 lines per inch and 65 lines per inch for the background elements and the security term elements, respectively. The size of the background elements may vary across the document so that the density varies from 30% of the area covered to 3%, and the size of the security term elements may vary across the document so that the density varies from 49% to 4% of the area covered. For example, the highest percentages of coverage may be at the top of the security document. These percentages are then gradually reduced toward the bottom of the document. This change in coverage percentages may occur in steps, producing bands of slightly differing tone. If desired, however, the size of the elements or the frequency of the elements, or both, may be continuously varied over the document surface. Regardless of the manner in which the size of the background elements and the size of the security term elements are varied, the selection of element sizes for a given area on the document is made such that they provide generally equal tone. The tones may differ more if a camouflage image is used.
The copy module areas can be any shape. In addition, more than one shape of copy module can be used in a security document. Preferably, a shape such as a rectangle, a square, a circle, or a triangle is used. Most preferably, copy modules are rectangular in shape.
The security document of the present invention contains at least two copy modules. Preferably, at least ten copy modules are present on a security document. More preferably, at least twenty copy modules are used. Most preferably, at least forty copy modules are used on the security document.
It should be understood that the phrase "security term" is intended to include not only words, such as the word "VOID" shown in the drawings, but also words and phrases which simply make evident to an observer that the document being inspected is a copy of the original document. Such phrases as "PHOTOCOPY", "COPY", and "DUPLICATE" may be used for this purpose. Also intended to be included within the phrase "security term" are words or symbols which may signify to the individual making the copy that the original document is authentic.
It should be appreciated that the phrase "cancellation term" is intended to include words, such as the word "VOID" shown in the drawings, and phrases, such as "UNAUTHORIZED COPY," which make evident to an observer that the document being inspected is a copy of the original document and that the copy is not authentic.
It should be understood that any of a wide variety of camouflage images may be utilized in this fashion to disguise the cancellation terms on a security document according to the present invention. For a camouflage to be effective, the camouflage image usually occupies about 50% of the document surface area. A properly configured camouflage image becomes the dominant image in the eye of the casual observer. A camouflage image may be defined by the absence of elements within the image area or by the presence of further printed elements. Elements which are removed to define a camouflage image may be wholly or partially removed. Partial removal of an element results in a portion of the element being completely removed.
It should be appreciated that the term "adjacent" refers to areas that are adjoining. For example, "adjacent copy modules" are copy modules that share a portion of their respective boundaries with each other. The term "ordered array" describes an organized layout of areas of approximately equal size. The phrase "readily duplicated" is defined as being capable of being clearly reproduced without significant blurring of the image.
A preferred method for producing a document according to the present invention is as follows:
1. Define the size of the area to be filled by the security term and the background.
2. Sub-divide the larger area into smaller sectors of a size to just accept the security term. Begin with several recommended message sizes and manipulate the message areas and the messages to fit and fill the overall area. These areas will often be rectangular, but need not always be so. It is preferable to use large message words and to fill the area with as many words as possible.
3. Create area boundaries for the unit background areas and fill them all with the preferred density value. A density of 10% is useful for many conditions. The boxes do not have to be the same size. They should fit together to achieve the area coverage desired. Floor tile designs give a model for such area fills.
4. Size the warning messages to just fill the unit background areas. If the background boxes are of various sizes, security terms must be sized to fit each box.
5. Assign screen type, screen angle, and percentage of area covered to the elements of each security term. Some assignments will produce messages lighter than the background and others will produce messages darker than the background on the printed page. The copier will also produce some copies with messages lighter than the background and others with messages darker than the background. Both general effects may occur to different degrees on the same document in one or more of the copy modules.
6. Assign screen type and screen angle to the elements of the background areas based on the values assigned to the security term elements. These assignments should be coordinated with the message assignments to bring out the messages as expected.
7. Link the assigned background fill and the related message into a single unit that fully describes the sector except for the selected camouflage.
8. Cover as much of the area as desired with the selected camouflage pattern.
Having described the improved security document of the present invention in detail and by reference to different embodiments thereof, it will be apparent that certain modifications and variations are possible without departing from the scope of the invention defined in the appended claims.

Claims (21)

What is claimed is:
1. A security document comprising:
a substrate having a top surface for carrying printed indicia;
said top surface defining a plurality of areas; said areas being organized in an ordered array; each of said areas containing:
a) background printed matter printed on said top surface, said background printed matter made up of a pattern of background elements; and
b) a security term printed on said top surface of said substrate, said security term composed of a pattern of security term elements; wherein, said background elements, or said security term elements, or both, within one of said areas, differ in element shape from background elements and security term elements within another of said areas; and further, wherein, within each of said areas, either said background elements or said security term elements are not readily duplicated by a color copier while the remaining elements in said area are readily duplicated by a color copier, whereby, upon copying of said security document, a visually perceptible security term is produced.
2. The security document of claim 1 wherein said background printed matter is made up of a pattern of background elements of substantially the same size.
3. The security document of claim 1 wherein said security term is made up of a pattern of security term elements of substantially the same size.
4. The security document of claim 1 wherein said background elements in one or more of said areas are not resolvable by a color copier.
5. The security document of claim 1 wherein said security term elements in one or more of said areas are not resolvable by a color copier.
6. The security document of claim 1 wherein said security term is a cancellation term.
7. The security document of claim 1 wherein each said security term element is a printed dot or a line segment.
8. The security document of claim 1 wherein each said background element is a printed dot or a line segment.
9. The security document of claim 1 wherein each said security term element and each said background element is a printed dot.
10. The security document of claim 1 wherein each said security term element and each said background element is a line segment.
11. The security document of claim 7 wherein said line segments are oriented at angles of approximately 0, 15, 30, 45, 60, 75, 90, 105, 120, 135, 150, or 165 degrees to the horizontal axis of said security document.
12. The security document of claim 1 wherein said background elements are spaced at twice the frequency of said security term elements.
13. The security document of claim 1 wherein said top surface contains at least three said areas.
14. The security document of claim 1 wherein said top surface contains at least four said areas.
15. The security document of claim 1 wherein said top surface contains at least ten said areas.
16. The security document of claim 1 wherein said top surface contains at least twenty said areas.
17. The security document of claim 1 wherein said top surface contains at least forty said areas.
18. The security document of claim 1 wherein said security term elements in one of said areas are not resolvable by a color copier and said background elements in another of said areas are not resolvable by a color copier.
19. The security document of claim 1 wherein said background elements or said security term elements, or both, differ in element size, shape, angle, density, or frequency between adjacent areas.
20. A security document comprising a substrate having a top surface for carrying printed indicia, said top surface defining a plurality of areas, each of said areas being bounded by directly adjacent areas, and each of said areas containing a pattern of background elements printed on said top surface of said substrate and a pattern of security elements printed on said top surface of said substrate, wherein
said background elements, said security elements, or both, within a selected one of said areas differ in element size, shape, angle, density, or frequency from background elements in an area offset from said selected area in a first direction across said top surface and differ in element size, share, angle, density, or frequency from security elements in said area offset from said selected area in said first direction across said top surface,
said background elements, said security elements, or both, within said selected area differ in element size, shape, angle, density, or frequency from background elements in an area offset from said selected area in a second direction across said top surface and differ in element size, shape, angle, density, or frequency from security elements in said area offset from said selected area in said second direction across said top surface,
said first direction is directed towards a first directly adjacent area,
said second direction is directed towards a second directly adjacent area, and wherein
a linear projection co-linear with said first direction does not intersect both of said first directly adjacent area and said second directly adjacent area.
21. A security document as claimed in claim 20, wherein said first direction and said second direction are substantially orthogonal.
US08/611,378 1996-03-05 1996-03-05 Security document Expired - Lifetime US5853197A (en)

Priority Applications (11)

Application Number Priority Date Filing Date Title
US08/611,378 US5853197A (en) 1996-03-05 1996-03-05 Security document
JP9531769A JP2000506085A (en) 1996-03-05 1997-02-12 Security document
PCT/US1997/002229 WO1997032735A1 (en) 1996-03-05 1997-02-12 Security document
NZ331420A NZ331420A (en) 1996-03-05 1997-02-12 Security document not readily duplicated by a colour copier
CA002247112A CA2247112C (en) 1996-03-05 1997-02-12 Security document
EP97907612A EP0889788B1 (en) 1996-03-05 1997-02-12 Security document
DE69708071T DE69708071T2 (en) 1996-03-05 1997-02-12 SECURITY DOCUMENT
AU19575/97A AU717797B2 (en) 1996-03-05 1997-02-12 Security document
CO97011615A CO4650202A1 (en) 1996-03-05 1997-03-04 SECURITY DOCUMENT
IDP970685A ID19781A (en) 1996-03-05 1997-03-05 PLANNED DOCUMENTS
NO984055A NO984055L (en) 1996-03-05 1998-09-03 security Document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/611,378 US5853197A (en) 1996-03-05 1996-03-05 Security document

Publications (1)

Publication Number Publication Date
US5853197A true US5853197A (en) 1998-12-29

Family

ID=24448785

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/611,378 Expired - Lifetime US5853197A (en) 1996-03-05 1996-03-05 Security document

Country Status (11)

Country Link
US (1) US5853197A (en)
EP (1) EP0889788B1 (en)
JP (1) JP2000506085A (en)
AU (1) AU717797B2 (en)
CA (1) CA2247112C (en)
CO (1) CO4650202A1 (en)
DE (1) DE69708071T2 (en)
ID (1) ID19781A (en)
NO (1) NO984055L (en)
NZ (1) NZ331420A (en)
WO (1) WO1997032735A1 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0920383A1 (en) * 1996-08-21 1999-06-09 Baasel-Scheel Lasergraphics GmbH Printed document protected against copying
US6050606A (en) * 1997-06-06 2000-04-18 De La Rue Giori S.A. Safety drawing for securities
US6095425A (en) * 1998-10-26 2000-08-01 The Standard Register Company Machine-readable security document and method of preparing the same
US6254007B1 (en) * 1999-03-26 2001-07-03 The Standard Register Company Security image element tiling scheme
US6347319B1 (en) 1999-06-04 2002-02-12 Hewlett-Packard Company Methods of obtaining listings of information from databases
US20030038974A1 (en) * 2001-08-14 2003-02-27 Huver Hu Security document manufacturing method and apparatus using halftone dots that contain microscopic images
US6538757B1 (en) 2000-05-19 2003-03-25 Pitney Bowes Inc. Method for automatically reading electronic tickets
US6602298B1 (en) 1999-06-04 2003-08-05 Hewlett-Packard Development Company, L.P. Methods of storing and retrieving communications, information, and documents
US6628412B1 (en) 1999-08-05 2003-09-30 Hewlett-Packard Development Company, L.P. Methods of document management and automated document tracking, and a document management system
EP1370062A1 (en) * 2002-05-30 2003-12-10 Xerox Corporation Application of glossmarks for printing on ordinary image reproducers
US20040001233A1 (en) * 2002-06-27 2004-01-01 Xerox Corporation Protecting printed items intended for public exchange with glossmarks
US20040000786A1 (en) * 2002-06-27 2004-01-01 Xerox Corporation Variable glossmark
US6692030B1 (en) * 2000-07-21 2004-02-17 Verify First Technologies, Inc. Security document with nano-pattern
US20040051885A1 (en) * 2002-09-18 2004-03-18 Fuji Xerox Co., Ltd. Image processing apparatus, image processing method, and image processing program product
US20040058130A1 (en) * 2001-08-14 2004-03-25 Nissing Nicholas James Printed substrate with variable local attributes
US20040114160A1 (en) * 2002-12-12 2004-06-17 Xerox Corporation Tag control for runtime glossmarks
US20040114190A1 (en) * 2002-12-12 2004-06-17 Man Lai Chee Methods and apparatus for watermarking digitally printed documents
EP1447234A1 (en) 2003-02-13 2004-08-18 Kba-Giori S.A. Printing process on a security element and security element
EP1447235A1 (en) 2003-02-13 2004-08-18 Kba-Giori S.A. Security element and printing method
US20040179266A1 (en) * 2001-06-08 2004-09-16 Andreas Schilling Diffractive security element
US6833956B2 (en) * 1998-07-02 2004-12-21 Commonwealth Scientific And Industrial Research Organisation Of Campbell Diffractive structure with interstitial elements
WO2005000585A1 (en) 2003-06-30 2005-01-06 Kba-Giori S.A. Printing machine
US20050057775A1 (en) * 2003-09-12 2005-03-17 Kazunari Iriuchijima Data printing method using a small printer and a commodity data register
US6880124B1 (en) 1999-06-04 2005-04-12 Hewlett-Packard Development Company, L.P. Methods of storing and retrieving information, and methods of document retrieval
US20050086482A1 (en) * 2003-10-15 2005-04-21 Phillips George K. Copy-resistant security paper
US20050128523A1 (en) * 2003-12-12 2005-06-16 Xerox Corporation Reduction of differential gloss
US20050128524A1 (en) * 2003-12-12 2005-06-16 Xerox Corporation Enhancement of glossmark images at low and high densities
US20050286083A1 (en) * 2004-06-29 2005-12-29 Xerox Corporation Glossmark images with clear toner
US20060044617A1 (en) * 2004-08-30 2006-03-02 Xerox Corporation Reduction of differential gloss with halftoned clear toner
US20060072159A1 (en) * 2004-09-29 2006-04-06 Xerox Corporation Variable data differential gloss images
US20060127117A1 (en) * 2004-09-28 2006-06-15 Xerox Corporation User interface for differential gloss images
US20060202468A1 (en) * 2005-02-22 2006-09-14 Verify First Technologies, Inc. Security document having integrated copy-void and validation security features
EP1705529A1 (en) 2005-03-22 2006-09-27 Eastman Kodak Company Method and device for controlling differential gloss and print item produced thereby
US20060284411A1 (en) * 2004-12-16 2006-12-21 Wu Judy W Digitally printed anti-copy document and processes and products therefor
US7180635B2 (en) 2002-05-30 2007-02-20 Xerox Corporation Halftone image gloss control for glossmarks
US7231594B1 (en) * 1999-02-10 2007-06-12 Collegenet, Inc. Method for paperless attachment of supplementary forms to a world wide web application
US20070257977A1 (en) * 2006-05-05 2007-11-08 Document Security Systems, Inc. Security enhanced print media with copy protection
US20080165387A1 (en) * 2007-01-02 2008-07-10 Adlertech International Inc. Digitally printed color anti-copy document in any resolution and processes and products therefor
US7477417B1 (en) * 1999-09-07 2009-01-13 Dai Nippon Printing Co., Ltd. Image processing system
US20100002903A1 (en) * 2008-07-03 2010-01-07 Young-Min Kwak Protection method for preventing hard copy of document from being released or reproduced
US20100195160A1 (en) * 2005-03-22 2010-08-05 Detlef Schulze-Hagenest Method and device for controlling differential gloss and print item produced thereby
US20110038013A1 (en) * 2004-01-23 2011-02-17 Canon Kabushiki Kaisha Image processing apparatus and image processing method
WO2011021110A1 (en) 2009-08-20 2011-02-24 Nds Limited Electronic book security features
US8090141B2 (en) 2006-01-31 2012-01-03 Xerox Corporation System and method to automatically establish preferred area for image-wise watermark
US8553291B2 (en) 2003-09-17 2013-10-08 Canon Kabushiki Kaisha Copy-forgery-inhibited pattern image generation method and image processing apparatus
USD880875S1 (en) * 2018-05-09 2020-04-14 Alva Ellis Restroom paper
US20230342347A1 (en) * 2020-05-12 2023-10-26 AirMettle, Inc. Partitioning, processing, and protecting data

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7047883B2 (en) * 2002-07-15 2006-05-23 Jds Uniphase Corporation Method and apparatus for orienting magnetic flakes
JP5215654B2 (en) * 2007-12-26 2013-06-19 小林クリエイト株式会社 Anti-counterfeit printed matter
JP5071523B2 (en) * 2010-06-03 2012-11-14 コニカミノルタビジネステクノロジーズ株式会社 Background pattern image synthesis apparatus, background pattern image synthesis method, and computer program
IT1401397B1 (en) * 2010-08-05 2013-07-18 Gianluca Frasson FORM FOR THE REALIZATION OF UNPAINTABLE PAPER DOCUMENTS AND / OR NOT CONTRACTABLE
JP5975284B2 (en) * 2012-10-04 2016-08-23 独立行政法人 国立印刷局 Photocopying materials
DE102012219473A1 (en) * 2012-10-24 2014-05-08 Tesa Scribos Gmbh Device and method for the production of security labels and security labels

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2018197A (en) * 1978-04-11 1979-10-17 Bradbury Wilkinson & Co Security documents
US4227720A (en) * 1978-11-08 1980-10-14 Burroughs Corporation Protected document
US4234214A (en) * 1977-08-22 1980-11-18 Governor & Company Of The Bank Of England Document carrying a legible code, and method and apparatus for producing same
JPS6110482A (en) * 1984-06-26 1986-01-17 Fuji Xerox Co Ltd Duplication-unabled manuscript sheet
US4579370A (en) * 1982-09-10 1986-04-01 Burroughs Corporation Multi-tone cancellation phrase and background
EP0204552A2 (en) * 1985-06-05 1986-12-10 THOMAS DE LA RUE & COMPANY LIMITED Improvements in and relating to printed documents resistant to counterfeiting
US4715623A (en) * 1984-09-28 1987-12-29 American Bank Note Company Documents having a revealable concealed identifier and the method of making such documents
JPS6321970A (en) * 1986-07-09 1988-01-29 ユニチカ株式会社 Treatment of glass cloth
US4891666A (en) * 1988-11-28 1990-01-02 Quebecor Publitech Inc. Copy indicator for a document
US5074596A (en) * 1989-02-23 1991-12-24 De La Rue Giori S.A. Currency paper, especially bank note, with a safety design and process for producing it
US5078428A (en) * 1990-12-03 1992-01-07 Hosokawa Printing Co., Ltd. Copy-proof sheet
US5197765A (en) * 1991-07-12 1993-03-30 The Standard Register Company Varying tone securing document
EP0546765A1 (en) * 1991-12-07 1993-06-16 Moore Business Forms, Inc. Security printed documents
US5340159A (en) * 1991-07-12 1994-08-23 The Standard Register Company Varying tone security document
US5375886A (en) * 1993-04-14 1994-12-27 Hosokawa Printing Co., Ltd. Counterfeit-proof paper for discouraging attempt at reproduction with copying device
US5487567A (en) * 1992-04-24 1996-01-30 Francois-Charles Oberthur Group Printing method and copy-evident secure document
US5538290A (en) * 1993-05-05 1996-07-23 Formtronics, Inc. Method and apparatus for inhibiting the copying of checks and negotiable documents
US5575508A (en) * 1993-05-05 1996-11-19 Formtronics, Inc. Method and apparatus for inhibiting the copying of checks and negotiable documents
US5707083A (en) * 1996-08-22 1998-01-13 Moore Business Forms, Inc. Security documents with multi-angled voids
US5717040A (en) * 1993-08-16 1998-02-10 Basf Aktiengesellschaft Continuous process for polymerizing anionically polymerizable vinyl compounds
US5735547A (en) * 1992-10-01 1998-04-07 Morelle; Fredric T. Anti-photographic/photocopy imaging process and product made by same

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4234214A (en) * 1977-08-22 1980-11-18 Governor & Company Of The Bank Of England Document carrying a legible code, and method and apparatus for producing same
GB2018197A (en) * 1978-04-11 1979-10-17 Bradbury Wilkinson & Co Security documents
US4227720A (en) * 1978-11-08 1980-10-14 Burroughs Corporation Protected document
US4579370A (en) * 1982-09-10 1986-04-01 Burroughs Corporation Multi-tone cancellation phrase and background
JPS6110482A (en) * 1984-06-26 1986-01-17 Fuji Xerox Co Ltd Duplication-unabled manuscript sheet
US4715623A (en) * 1984-09-28 1987-12-29 American Bank Note Company Documents having a revealable concealed identifier and the method of making such documents
EP0204552A2 (en) * 1985-06-05 1986-12-10 THOMAS DE LA RUE & COMPANY LIMITED Improvements in and relating to printed documents resistant to counterfeiting
JPS6321970A (en) * 1986-07-09 1988-01-29 ユニチカ株式会社 Treatment of glass cloth
US4891666A (en) * 1988-11-28 1990-01-02 Quebecor Publitech Inc. Copy indicator for a document
US5074596A (en) * 1989-02-23 1991-12-24 De La Rue Giori S.A. Currency paper, especially bank note, with a safety design and process for producing it
US5078428A (en) * 1990-12-03 1992-01-07 Hosokawa Printing Co., Ltd. Copy-proof sheet
US5197765A (en) * 1991-07-12 1993-03-30 The Standard Register Company Varying tone securing document
US5340159A (en) * 1991-07-12 1994-08-23 The Standard Register Company Varying tone security document
EP0546765A1 (en) * 1991-12-07 1993-06-16 Moore Business Forms, Inc. Security printed documents
US5297815A (en) * 1991-12-07 1994-03-29 Moore Business Forms, Inc. Security printed documents
US5487567A (en) * 1992-04-24 1996-01-30 Francois-Charles Oberthur Group Printing method and copy-evident secure document
US5735547A (en) * 1992-10-01 1998-04-07 Morelle; Fredric T. Anti-photographic/photocopy imaging process and product made by same
US5375886A (en) * 1993-04-14 1994-12-27 Hosokawa Printing Co., Ltd. Counterfeit-proof paper for discouraging attempt at reproduction with copying device
US5538290A (en) * 1993-05-05 1996-07-23 Formtronics, Inc. Method and apparatus for inhibiting the copying of checks and negotiable documents
US5575508A (en) * 1993-05-05 1996-11-19 Formtronics, Inc. Method and apparatus for inhibiting the copying of checks and negotiable documents
US5717040A (en) * 1993-08-16 1998-02-10 Basf Aktiengesellschaft Continuous process for polymerizing anionically polymerizable vinyl compounds
US5707083A (en) * 1996-08-22 1998-01-13 Moore Business Forms, Inc. Security documents with multi-angled voids

Cited By (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0920383A1 (en) * 1996-08-21 1999-06-09 Baasel-Scheel Lasergraphics GmbH Printed document protected against copying
US6209922B1 (en) * 1996-08-21 2001-04-03 Baasel Scheel Lasergraphics Gmbh Copy protected security print
EP0920383B1 (en) * 1996-08-21 2002-08-21 Baasel-Scheel Lasergraphics GmbH Printed document protected against copying
US6050606A (en) * 1997-06-06 2000-04-18 De La Rue Giori S.A. Safety drawing for securities
US6833956B2 (en) * 1998-07-02 2004-12-21 Commonwealth Scientific And Industrial Research Organisation Of Campbell Diffractive structure with interstitial elements
US6095425A (en) * 1998-10-26 2000-08-01 The Standard Register Company Machine-readable security document and method of preparing the same
US6161869A (en) * 1998-10-26 2000-12-19 The Standard Register Company Machine-readable security document and method of preparing the same
US7231594B1 (en) * 1999-02-10 2007-06-12 Collegenet, Inc. Method for paperless attachment of supplementary forms to a world wide web application
US6254007B1 (en) * 1999-03-26 2001-07-03 The Standard Register Company Security image element tiling scheme
US6880124B1 (en) 1999-06-04 2005-04-12 Hewlett-Packard Development Company, L.P. Methods of storing and retrieving information, and methods of document retrieval
US6347319B1 (en) 1999-06-04 2002-02-12 Hewlett-Packard Company Methods of obtaining listings of information from databases
US6602298B1 (en) 1999-06-04 2003-08-05 Hewlett-Packard Development Company, L.P. Methods of storing and retrieving communications, information, and documents
US6628412B1 (en) 1999-08-05 2003-09-30 Hewlett-Packard Development Company, L.P. Methods of document management and automated document tracking, and a document management system
US20040027604A1 (en) * 1999-08-05 2004-02-12 Jeran Paul L. Methods of document management, methods of automated document tracking, document tracking methods, and document tracking systems
US7477417B1 (en) * 1999-09-07 2009-01-13 Dai Nippon Printing Co., Ltd. Image processing system
US6538757B1 (en) 2000-05-19 2003-03-25 Pitney Bowes Inc. Method for automatically reading electronic tickets
US6692030B1 (en) * 2000-07-21 2004-02-17 Verify First Technologies, Inc. Security document with nano-pattern
US20040179266A1 (en) * 2001-06-08 2004-09-16 Andreas Schilling Diffractive security element
US7196822B2 (en) 2001-08-14 2007-03-27 Amgraf, Inc. Security document manufacturing method and apparatus using halftone dots that contain microscopic images
US20030038974A1 (en) * 2001-08-14 2003-02-27 Huver Hu Security document manufacturing method and apparatus using halftone dots that contain microscopic images
US20040058130A1 (en) * 2001-08-14 2004-03-25 Nissing Nicholas James Printed substrate with variable local attributes
US20070133059A1 (en) * 2001-08-14 2007-06-14 Amgraf, Inc. Security document manufacturing method and apparatus using halftone dots that contain microscopic images
US7180635B2 (en) 2002-05-30 2007-02-20 Xerox Corporation Halftone image gloss control for glossmarks
US20040156078A1 (en) * 2002-05-30 2004-08-12 Xerox Corporation Application of glossmarks for graphics enhancement
US7092128B2 (en) 2002-05-30 2006-08-15 Xerox Corporation Application of glossmarks for graphics enhancement
EP1370062A1 (en) * 2002-05-30 2003-12-10 Xerox Corporation Application of glossmarks for printing on ordinary image reproducers
US7148999B2 (en) 2002-06-27 2006-12-12 Xerox Corporation Variable glossmark
EP1377028A1 (en) * 2002-06-27 2004-01-02 Xerox Corporation Method for protecting printed items intended for public use with glossmarks
US20040000786A1 (en) * 2002-06-27 2004-01-01 Xerox Corporation Variable glossmark
US20040001233A1 (en) * 2002-06-27 2004-01-01 Xerox Corporation Protecting printed items intended for public exchange with glossmarks
US7126721B2 (en) 2002-06-27 2006-10-24 Xerox Corporation Protecting printed items intended for public exchange with glossmarks
US20040051885A1 (en) * 2002-09-18 2004-03-18 Fuji Xerox Co., Ltd. Image processing apparatus, image processing method, and image processing program product
US8014036B2 (en) * 2002-12-12 2011-09-06 Electronics For Imaging, Inc. Methods and apparatus for watermarking digitally printed documents
US7307761B2 (en) 2002-12-12 2007-12-11 Electronics For Imaging, Inc. Methods and apparatus for watermarking digitally printed documents
US20080088881A1 (en) * 2002-12-12 2008-04-17 Man Lai C Methods and apparatus for watermarking digitally printed documents
US7880934B2 (en) 2002-12-12 2011-02-01 Electronics For Imaging, Inc. Methods and apparatus for watermarking digitally printed documents
US7193751B2 (en) 2002-12-12 2007-03-20 Xerox Corporation Tag control for runtime glossmarks
US20110085209A1 (en) * 2002-12-12 2011-04-14 Lai Chee Man Methods and apparatus for watermarking digitally printed documents
US20040114190A1 (en) * 2002-12-12 2004-06-17 Man Lai Chee Methods and apparatus for watermarking digitally printed documents
US20040114160A1 (en) * 2002-12-12 2004-06-17 Xerox Corporation Tag control for runtime glossmarks
EP1447234A1 (en) 2003-02-13 2004-08-18 Kba-Giori S.A. Printing process on a security element and security element
EP1447235A1 (en) 2003-02-13 2004-08-18 Kba-Giori S.A. Security element and printing method
CN100371177C (en) * 2003-02-13 2008-02-27 卡巴-乔利有限公司 Security element and printing method
US20080134920A1 (en) * 2003-02-13 2008-06-12 Gianfranco Foresti Security Element and Printing Method
US20060175824A1 (en) * 2003-02-13 2006-08-10 Fausto Giori Method for printing a security element and security element
WO2004071781A1 (en) 2003-02-13 2004-08-26 Kba-Giori S.A. Method for printing a security element and security element
EP2189286A2 (en) 2003-06-30 2010-05-26 Kba-Giori S.A. Printing machine and method
US8286551B2 (en) 2003-06-30 2012-10-16 Kba-Notasys Sa Printing machine
US8621997B2 (en) 2003-06-30 2014-01-07 Kba-Notasys Sa Printing machine
WO2005000585A1 (en) 2003-06-30 2005-01-06 Kba-Giori S.A. Printing machine
US20110017081A1 (en) * 2003-06-30 2011-01-27 Kba-Giori S.A. Printing Machine
US20060219107A1 (en) * 2003-06-30 2006-10-05 Matthias Gygi Printing machine
US7360696B2 (en) * 2003-09-12 2008-04-22 Nec Infrontia Corporation Data printing method using a small printer and a commodity data register
US20050057775A1 (en) * 2003-09-12 2005-03-17 Kazunari Iriuchijima Data printing method using a small printer and a commodity data register
US8553291B2 (en) 2003-09-17 2013-10-08 Canon Kabushiki Kaisha Copy-forgery-inhibited pattern image generation method and image processing apparatus
US20140022604A1 (en) * 2003-09-17 2014-01-23 Canon Kabushiki Kaisha Copy-forgery-inhibited pattern image generation method and image processing apparatus
US10038802B2 (en) * 2003-09-17 2018-07-31 Canon Kabushiki Kaisha Copy-forgery-inhibited pattern image generation method and image processing apparatus
US7625613B2 (en) 2003-10-15 2009-12-01 Verify First Technologies, Inc. Copy-resistant security paper
US20050086482A1 (en) * 2003-10-15 2005-04-21 Phillips George K. Copy-resistant security paper
US20080079971A1 (en) * 2003-12-12 2008-04-03 Xerox Corporation Enhancement of glossmark images at low and high densities with selective application of clear toner
US7352493B2 (en) 2003-12-12 2008-04-01 Xerox Corporation Enhancement of glossmark images at low and high densities
US7382495B2 (en) 2003-12-12 2008-06-03 Xerox Corporation Reduction of differential gloss
US20050128524A1 (en) * 2003-12-12 2005-06-16 Xerox Corporation Enhancement of glossmark images at low and high densities
US20050128523A1 (en) * 2003-12-12 2005-06-16 Xerox Corporation Reduction of differential gloss
US7813006B2 (en) 2003-12-12 2010-10-12 Xerox Corporation Enhancement of glossmark images at low and high densities with selective application of clear toner
US20110038013A1 (en) * 2004-01-23 2011-02-17 Canon Kabushiki Kaisha Image processing apparatus and image processing method
US8659792B2 (en) * 2004-01-23 2014-02-25 Canon Kabushiki Kaisha Image processing apparatus and image processing method
US20050286083A1 (en) * 2004-06-29 2005-12-29 Xerox Corporation Glossmark images with clear toner
US7301675B2 (en) 2004-06-29 2007-11-27 Xerox Corporation Glossmark images with clear toner
US20060044617A1 (en) * 2004-08-30 2006-03-02 Xerox Corporation Reduction of differential gloss with halftoned clear toner
US7304770B2 (en) 2004-08-30 2007-12-04 Xerox Corporation Reduction of differential gloss with halftoned clear toner
US7391537B2 (en) 2004-09-28 2008-06-24 Xerox Corporation User interface for differential gloss images
US20060127117A1 (en) * 2004-09-28 2006-06-15 Xerox Corporation User interface for differential gloss images
US20060072159A1 (en) * 2004-09-29 2006-04-06 Xerox Corporation Variable data differential gloss images
US7324241B2 (en) 2004-09-29 2008-01-29 Xerox Corporation Variable data differential gloss images
US20060284411A1 (en) * 2004-12-16 2006-12-21 Wu Judy W Digitally printed anti-copy document and processes and products therefor
US20080267448A1 (en) * 2005-02-22 2008-10-30 Verify First Technologies, Inc. Security document having integrated copy-void and validation security features
US20060202468A1 (en) * 2005-02-22 2006-09-14 Verify First Technologies, Inc. Security document having integrated copy-void and validation security features
EP1705529A1 (en) 2005-03-22 2006-09-27 Eastman Kodak Company Method and device for controlling differential gloss and print item produced thereby
US20100195160A1 (en) * 2005-03-22 2010-08-05 Detlef Schulze-Hagenest Method and device for controlling differential gloss and print item produced thereby
US8437044B2 (en) 2005-03-22 2013-05-07 Eastman Kodak Company Method and device for controlling differential gloss and print item produced thereby
US8090141B2 (en) 2006-01-31 2012-01-03 Xerox Corporation System and method to automatically establish preferred area for image-wise watermark
US20070257977A1 (en) * 2006-05-05 2007-11-08 Document Security Systems, Inc. Security enhanced print media with copy protection
US20080165387A1 (en) * 2007-01-02 2008-07-10 Adlertech International Inc. Digitally printed color anti-copy document in any resolution and processes and products therefor
US8164799B2 (en) 2007-01-02 2012-04-24 Wu Judy W Digitally printed color anti-copy document in any resolution and processes and products therefor
US20100002903A1 (en) * 2008-07-03 2010-01-07 Young-Min Kwak Protection method for preventing hard copy of document from being released or reproduced
US8085972B2 (en) * 2008-07-03 2011-12-27 Primax Electronics Ltd. Protection method for preventing hard copy of document from being released or reproduced
WO2011021110A1 (en) 2009-08-20 2011-02-24 Nds Limited Electronic book security features
WO2011021111A1 (en) 2009-08-20 2011-02-24 Nds Limited Hindering optical character recognition of a displayed text
WO2011021113A1 (en) 2009-08-20 2011-02-24 Nds Limited Electronic book security features
WO2011021112A1 (en) 2009-08-20 2011-02-24 Nds Limited Electronic book security features
US8791788B2 (en) 2009-08-20 2014-07-29 Cisco Technology Inc. Electronic book security features
WO2011021114A1 (en) 2009-08-20 2011-02-24 Nds Limited Electronic book security features
USD880875S1 (en) * 2018-05-09 2020-04-14 Alva Ellis Restroom paper
US20230342347A1 (en) * 2020-05-12 2023-10-26 AirMettle, Inc. Partitioning, processing, and protecting data

Also Published As

Publication number Publication date
ID19781A (en) 1998-07-30
DE69708071T2 (en) 2002-07-04
EP0889788A1 (en) 1999-01-13
WO1997032735A1 (en) 1997-09-12
AU717797B2 (en) 2000-03-30
NO984055L (en) 1998-11-05
DE69708071D1 (en) 2001-12-13
JP2000506085A (en) 2000-05-23
EP0889788B1 (en) 2001-11-07
CA2247112A1 (en) 1997-09-12
CA2247112C (en) 2001-10-30
AU1957597A (en) 1997-09-22
NO984055D0 (en) 1998-09-03
CO4650202A1 (en) 1998-09-03
NZ331420A (en) 2000-01-28

Similar Documents

Publication Publication Date Title
US5853197A (en) Security document
CA2062237C (en) Varying tone securing document
EP0614133B1 (en) Varying tone security document
US6000728A (en) Security document
US4341404A (en) Security document using a variable dot screen
US6692030B1 (en) Security document with nano-pattern
CA2084597C (en) Security printed documents
MXPA97004348A (en) Methods of protection of documents and products
EP2015940B1 (en) Security enhanced print media with copy protection
US5954368A (en) Security document containing a non-orthogonal array
CN107589921A (en) The generation method and device of a kind of shading-duplication preventing
AU7316991A (en) Anti-photographic/photocopy imaging process and product made by same
EP3678871B1 (en) Full color, digitally printed copy evident documents
CA2138097C (en) Security document
US20020067828A1 (en) Copy protected document
KR102340035B1 (en) Apparatus of manufacturing digital security paper having counterfeit protecting function
JP3086554B2 (en) Improved securities
JPH10236045A (en) Printed matter for anti-forgery

Legal Events

Date Code Title Description
AS Assignment

Owner name: STANDARD REGISTER COMPANY, THE, OHIO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOWRY, WILLIAM H., JR.;LAKES, A. DALE;REEL/FRAME:007926/0285

Effective date: 19960301

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: BANK OF AMERICA, N.A.,GEORGIA

Free format text: NOTICE OF GRANT OF SECURITY INTEREST IN PATENTS;ASSIGNOR:THE STANDARD REGISTER COMPANY;REEL/FRAME:024170/0252

Effective date: 20100331

Owner name: BANK OF AMERICA, N.A., GEORGIA

Free format text: NOTICE OF GRANT OF SECURITY INTEREST IN PATENTS;ASSIGNOR:THE STANDARD REGISTER COMPANY;REEL/FRAME:024170/0252

Effective date: 20100331

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, GE

Free format text: SECURITY AGREEMENT;ASSIGNOR:THE STANDARD REGISTER COMPANY;REEL/FRAME:031122/0114

Effective date: 20130809

AS Assignment

Owner name: SILVER POINT FINANCE, LLC, AS ADMINISTRATIVE AGENT

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:THE STANDARD REGISTER COMPANY;REEL/FRAME:031156/0892

Effective date: 20130808

Owner name: SILVER POINT FINANCE, LLC, AS ADMINISTRATIVE AGENT

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:THE STANDARD REGISTER COMPANY;REEL/FRAME:031157/0001

Effective date: 20130808

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, GE

Free format text: SECURITY INTEREST;ASSIGNOR:THE STANDARD REGISTER COMPANY;REEL/FRAME:035204/0146

Effective date: 20150312

AS Assignment

Owner name: SILVER POINT FINANCE, LLC, CONNECTICUT

Free format text: TERM LOAN PATENT SECURITY AGREEMENT;ASSIGNOR:THE STANDARD REGISTER COMPANY;REEL/FRAME:035425/0269

Effective date: 20150410

AS Assignment

Owner name: THE STANDARD REGISTER COMPANY, OHIO

Free format text: SECURITY INTEREST;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:036283/0153

Effective date: 20150731

Owner name: THE STANDARD REGISTER COMPANY, OHIO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:036283/0123

Effective date: 20150731

Owner name: THE STANDARD REGISTER COMPANY, OHIO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:036283/0139

Effective date: 20150731

Owner name: THE STANDARD REGISTER COMPANY, OHIO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:036283/0027

Effective date: 20150731

AS Assignment

Owner name: THE STANDARD REGISTER COMPANY, OHIO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:036304/0175

Effective date: 20150731

AS Assignment

Owner name: SR ACQUISITION CORPORATION, MINNESOTA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:THE STANDARD REGISTER COMPANY;STANDARD REGISTER INTERNATIONAL, INC.;STANDARD REGISTER TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:036941/0722

Effective date: 20150731

AS Assignment

Owner name: STANDARD REGISTER, INC., MINNESOTA

Free format text: CHANGE OF NAME;ASSIGNOR:SR ACQUISITION CORPORATION;REEL/FRAME:037045/0130

Effective date: 20150731

AS Assignment

Owner name: TAYLOR COMMUNICATIONS, INC., MINNESOTA

Free format text: MERGER;ASSIGNOR:STANDARD REGISTER, INC.;REEL/FRAME:045680/0889

Effective date: 20171215